• TimingMon-Fri 9AM-5:30PM EST
  • Free shipping for orders within the contiguous US over $75
  • (888) 963-6637
  • Contact Us
  • 0

Information Security

Information Security

Security Overview 

To learn more about our security program at Z Natural Foods and find security compliance artifacts, please reference our Security Status Page below:

Reporting Security Issues

If you believe you have discovered a vulnerability in a Z Natural Foods product or have a security incident to report, contact us at security@leanfactor.com. When researching a potential vulnerability in a Z Natural Foods product, please adhere to and remain cognizant of the following rules of the road:

  • Do not exploit any Z Natural Foods product beyond what is necessary to provide Z Natural Foods with the steps to replicate the potential vulnerability. Practically, this means not compromising accounts, downloading data, or causing a denial of service or destructive outcomes.
  • We consider the following potential vulnerabilities out of scope and ask that you refrain from reporting or conducting activities aimed at: social engineering, clickjacking, incomplete or non-implementation of protocols or configurations that you may consider industry standard (e.g., TLS enforcement, CSP/SPF/DMARC/DKIM), and Z Natural Foods Javascript code or integrations on a third party’s systems (research into such potential vulnerabilities should be governed by that third party’s responsible disclosure program). 

Once we have received a vulnerability report, Z Natural Foods takes a series of steps to address the issue:

  • Z Natural Foods requests the reporter keep any communication regarding the vulnerability confidential.
  • Z Natural Foods investigates and verifies the vulnerability using the reporter’s detailed instructions to replicate.
  • Z Natural Foods addresses the vulnerability, which may include patching the requisite software or system or using compensating controls to mitigate any harm.
  • Z Natural Foods will endeavor to keep the reporter apprised of the outcome of their report and, at that time, shall provide consent to the reporter’s publication of the vulnerability.

We greatly appreciate the efforts of security researchers and discoverers who share information on security issues with us, giving us a chance to improve our products and services and better protect our customers. Thank you for working with us through the above process.

When you use our Site, Service, Service Providers, place an order, or contact us, you are acknowledging that you have read, understand, and agree to be bound by all of our Policies referenced and/or published on this site, collectively referred to as TOU, which includes our Legal Notice DisclaimerPrivacy PolicyContent PolicyInformation & Security PolicyGDPR StatementCalifornia Prop 65 NoticeAccessibility StatementBot & Crawler Access Terms of Use PolicyAdvertising & Analytics PolicyProduct Reviews PolicyMobile Terms of ServiceShipping PolicyReturn PolicyCookie PolicyData Collection opt-outDMCA Compliance Statement, and Terms of Use Policy. Any disagreements must be settled with binding arbitration.